Btrieve Programmer s Reference

Size: px
Start display at page:

Download "Btrieve Programmer s Reference"

Transcription

1 Btrieve Programmer s Reference Copyright 1998 Pervasive Softare Inc. All rights reserved orldide. Reprodction, photocopying, or transmittal of this pblication, or portions of this pblication, is prohibited ithot the express prior ritten consent of the pblisher, nless sch reprodction, photocopying, or transmittal is part of a Derivative Softare Prodct as defined in the licenses granted in conjnction ith the prchase of this pblication and associated softare. This prodct incldes softare developed by Poerdog Indstries Poerdog Indstries. All rights reserved. Pervasive Softare Inc Capital of Texas Highay Astin, Texas USA

2 disclaimer trademarks PERVASIVE SOFTWARE INC. LICENSES THE SOFTWARE AND DOCUMENTATION PRODUCT TO YOU OR YOUR COMPANY SOLELY ON AN "AS IS" BASIS AND SOLELY IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THE ACCOMPANYING LICENSE AGREEMENT. PERVASIVE SOFTWARE INC. MAKES NO OTHER WARRANTIES WHATSOEVER, EITHER EXPRESS OR IMPLIED, REGARDING THE SOFTWARE OR THE CONTENT OF THE DOCUMENTATION; PERVASIVE SOFTWARE INC. HEREBY EXPRESSLY STATES AND YOU OR YOUR COMPANY ACKNOWLEDGES THAT PERVASIVE SOFTWARE INC. DOES NOT MAKE ANY WARRANTIES, INCLUDING, FOR EXAMPLE, WITH RESPECT TO MERCHANTABILITY, TITLE, OR FITNESS FOR ANY PARTICULAR PURPOSE OR ARISING FROM COURSE OF DEALING OR USAGE OF TRADE, AMONG OTHERS. Btrieve and XQL are registered trademarks of Pervasive Softare Inc. Bilt on Btrieve, Bilt on Scalable SQL, Client/Server in a Box, DDF Ease InstallScot, MicroKernel Database Engine, MicroKernel Database Architectre, Navigational Client/Server, Pervasive.SQL, Scalable SQL, Smart Components, Smart Component Management, Smart Naming, SmartScot, and Xtrieve PLUS are trademarks of Pervasive Softare Inc. Microsoft, MS-DOS, Windos, Windos NT, Win32, Win32s, and Visal Basic are registered trademarks of Microsoft Corporation. Windos 95 is a trademark of Microsoft Corporation. NetWare and Novell are registered trademarks of Novell, Inc. NetWare Loadable Modle, NLM, Novell DOS, Transaction Tracking System, and TTS are trademarks of Novell, Inc. All company and prodct names are the trademarks or registered trademarks of their respective companies. Btrieve Programmer s Reference Febrary 1998

3 Contents Abot This Manal Who Shold Read This Manal Organization Conventions Introdction to Btrieve APIs Btrieve Fnctions BTRV Fnction BTRVID Fnction BTRCALL Fnction BTRCALL32 Fnction BTRCALLID Fnction BTRCALLID32 Fnction Obsolete Fnctions Btrieve Fnction Parameters Operation Code Stats Code Position Block Data Bffer Data Bffer Length Key Bffer Key Nmber Client ID Key Length Smmary of Btrieve Operations Session-Specific Operations File-Specific Operations Btrieve Programmer s Reference 3 Contents

4 Seqence of Events in Performing a Btrieve Operation Btrieve Operations Abort Transaction (21) Begin Transaction (19 or 1019) Clear Oner (30) Close (1) Continos Operation (42) Create (14) Create Index (31) Delete (4) Drop Index (32) End Transaction (20) Find Percentage (45) Get By Percentage (44) Get Direct/Chnk (23) Get Direct/Record (23) Get Directory (18) Get Eqal (5) Get First (12) Get Greater (8) Get Greater Than or Eqal (9) Get Key (+50) Get Last (13) Get Less Than (10) Get Less Than or Eqal (11) Get Next (6) Get Next Extended (36) Get Position (22) Get Previos (7) Get Previos Extended (37) Insert (2) Insert Extended (40) Open (0) Btrieve Programmer s Reference 4 Contents

5 Reset (28) Set Directory (17) Set Oner (29) Stat (15) Stat Extended (65) Step First (33) Step Last (34) Step Next (24) Step Next Extended (38) Step Previos (35) Step Previos Extended (39) Stop (25) Unlock (27) Update (3) Update Chnk (53) Version (26) A Langage Interfaces C/C Interface Modles Programming Reqirements Program Example Creating Applications ith the Tenberry DOS/4G Extender Compiling, Linking, and Rnning the Program Example Compiling C++ Bilder Applications Cobol Program Example Delphi Program Example Compiling, Linking, and Rnning the Program Example Pascal Sorce Modles Compiling and Linking Using the Interface Program Example Btrieve Programmer s Reference 5 Contents

6 Programming Notes Visal Basic Program Example Compiling, Linking, and Rnning the Program Example Creating 32-Bit Applications B Data Types C Qick Reference of Btrieve Operations Btrieve Programmer s Reference 6 Contents

7 Tables 1-1 Btrieve Fnctions Client ID Strctre Session-Specific Operations File Access and Information Operations Data Retrieval Operations Data Maniplation Operations Data Bffer Strctre for Create Operation File Flag Vales Key Flag Vales Extended Data Types Data Bffer for Creating a User-Defined ACS Data Bffer for Specifying a Locale-Specific ACS Data Bffer for Specifying an ISR ACS ACS Name Formats Data Bffer Size Limitations by Environment Data Bffer for Random Chnk Operations Data Bffer for Rectangle Chnks Inpt Data Bffer Strctre for Extended Get and Step Operations Retrned Data Bffer Strctre for Extended Get and Step Operations Data Bffer Strctre for the Insert Extended Operation Open Modes Open Mode Combinations for Local Clients Using SEFS Btrieve Programmer s Reference 7 Tables

8 2-17 Open Mode Combinations for Local Clients Using MEFS Open Mode Combinations for Remote Clients Access and Encryption Codes Data Bffer Exclding File Version Information Data Bffer Inclding File Version Information Extended Files Descriptor System Data Descriptor Extended Files Retrn Bffer System Data Retrn Bffer Random Chnk Descriptor Strctre Rectangle Chnk Descriptor Strctre Trncate Descriptor Strctre Version Block A-1 Langage Interface Sorce Modles A-2 Common Data Types Used in the Btrieve Data Bffer A-3 Operating System Sitches B-1 Extended Key Types and Codes B-2 Rightmost Digit ith Embedded Sign C-1 Qick Reference of Btrieve Operations Btrieve Programmer s Reference 8 Tables

9 Abot This Manal This manal contains information abot ho to develop applications that se the Btrieve navigational data management system. Btrieve is designed for high-performance data handling and improved programming prodctivity. The fnctions described in this manal are available in the modles installed by the Programming Interfaces installation option. Yo may also parchase the Programmer s Site. The Programmer s Site prodct provides: all of the interfaces described in this manal a 5-ser version of both the NetWare and Windos NT server engines licensed for development and testing se only the complete set of Pervasive docmentation in hardcopy Who Shold Read This Manal This manal provides information for developers ho are sing Btrieve to develop applications for the OS/2, NetWare, Windos, Windos NT, and Windos 95 operating environments. Pervasive Softare old appreciate yor comments and sggestions abot this manal. Please complete the User Comments form that appears at the end of this manal, and fax or mail it to Pervasive Softare, or send to docs@pervasive.com. Btrieve Programmer s Reference 9 Abot This Manal

10 Organization Chapter 1 Introdction to Btrieve APIs This chapter provides a brief overvie of the Btrieve fnctions and their parameters. This chapter also smmarizes the Btrieve operations. Chapter 2 Btrieve Operations This chapter docments the Btrieve operations. Appendix A Langage Interfaces This appendix provides specific information abot the langage interfaces. Appendix B Data Types This appendix provides information abot the data types Btrieve spports for keys. Appendix C Qick Reference of Btrieve Operations This appendix smmarizes the Btrieve operations in order of operation nmber. Btrieve Programmer s Reference 10 Abot This Manal

11 Conventions Unless otherise noted, command syntax, code, and code examples se the folloing conventions: Case Commands and reserved ords typically appear in ppercase letters. Unless the manal states otherise, yo can enter these items sing ppercase, loercase, or both. For example, yo can type MYPROG, myprog, or MYprog. [ ] Sqare brackets enclose optional information, as in [log_name]. If information is not enclosed in sqare brackets, it is reqired. A vertical bar indicates a choice of information to enter, as in [file name]. < > Angle brackets enclose mltiple choices for a reqired item, as in /D=<5 6 7>. variable Words appearing in italics are variables that yo mst replace ith appropriate vales, as in file name.... An ellipsis folloing information indicates yo can repeat the information more than one time, as in [parameter...]. ::= The symbol ::= means one item is defined in terms of another. For example, a::=b means the item a is defined in terms of b. Btrieve Programmer s Reference 11 Abot This Manal

12 chapter 1 Introdction to Btrieve APIs The Btrieve navigational database management system is designed for highperformance data handling and improved programming prodctivity. Btrieve operations allo yor application to retrieve, insert, pdate, or delete records either by key vale, or by seqential or random access methods. The Programming Interfaces provide compatibility ith the folloing programming langages and development environments: Borland C/C++ Borland Delphi Micro Focs COBOL Microsoft Access Microsoft Visal Basic Microsoft Visal C++ Watcom C/C++ This chapter discsses the folloing topics: Btrieve Fnctions Btrieve Fnction Parameters Smmary of Btrieve Operations Seqence of Events in Performing a Btrieve Operation Btrieve Programmer s Reference 12 Introdction to Btrieve APIs

13 Btrieve Fnctions Btrieve offers a single-fnction API, in hich most program actions are determined by an operation code parameter, rather than a fnction name. Yo shold choose the API for yor application based on hether yo are most interested in cross-platform portability of code or the best possible performance on a particlar platform. Yor Btrieve application shold never perform any standard I/O against a data file. Yor application shold perform all file I/O sing a Btrieve fnction. Folloing are the Btrieve fnctions. Table 1-1 Btrieve Fnctions Fnction Operating Systems Description BTRV BTRVID BTRCALL BTRCALLID BTRCALL32 BTRCALLID32 All OS/2, Windos 3.x, Windos NT, and Windos 95 only For 32-bit OS/2 applications only Use for complete code portability beteen operating systems. For most developers, this advantage offsets a very slight performance decrease. Use these fnctions to achieve a slight performance increase or backard compatibility ith existing sorce code. To find the langage-specific syntax reqired hen calling a Btrieve fnction, refer to Appendix A, Langage Interfaces. Btrieve Programmer s Reference 13 Introdction to Btrieve APIs

14 BTRV Fnction BTRV allos an application to make Btrieve calls. All the langage interface modles provided ith the Programming Interfaces installation option spport the BTRV fnction. In OS/2, Windos 3.x, Windos NT, and Windos 95, the BTRV fnction actally calls the BTRCALL fnction. Hoever, BTRV is the preferred fnction becase of the platform independence it provides. BTRVID Fnction BTRVID allos an application to make a single Btrieve call that contains a clientid parameter, hich the application can control. An application can se BTRVID to assign itself more than one client identity to Btrieve and to execte operations for one client ithot affecting the state of the other clients. For more information, refer to Client ID. In OS/2, Windos 3.x, Windos NT, and Windos 95, the BTRVID fnction actally calls another fnction. In 16-bit applications, it calls the BTRCALLID fnction. In 32-bit applications, it calls the BTRCALLID32 fnction (OS/2) or the BTRCALLID fnction (Windos NT and Windos 95). Hoever, in both cases, BTRVID is the preferred fnction becase of the platform independence it provides. In DOS applications, yo mst load the DOS Reqester ith the appropriate /T vale. Set /T to eqal the nmber of client IDs yo se in the application. For more information abot the DOS Reqester, refer to Getting Started. BTRCALL Fnction BTRCALL is the preferred fnction if yor application accesses only local files and ses only the OS/2 or Win32 orkstation engines. For OS/2, the BTRCALL fnction is a 16-bit fnction. For Windos NT and Windos 95, the BTRCALL fnction is a 32-bit fnction. Btrieve Programmer s Reference 14 Introdction to Btrieve APIs

15 BTRCALL32 Fnction The BTRCALL32 fnction is the same as BTRCALL fnction, except that BTRCALL32 is a 32-bit fnction. BTRCALLID Fnction Use the BTRCALLID fnction if yo need client-level control and yor application operates only in the OS/2, Windos 3.x, Windos NT and Windos 95 environments. This fnction is similar to the BTRVID fnction, except that it does not call an intermediate fnction. For Windos NT and Windos 95, BTRCALLID is a 32-bit fnction. BTRCALLID32 Fnction The BTRCALLID32 fnction is the same as the BTRCALLID fnction, except that the BTRCALLID32 is a 32-bit fnction. Obsolete Fnctions The folloing historical fnctions are spported to maintain compatibility ith applications ritten for previos Btrieve releases: BTRCALLBACK BTRVINIT BTRVSTOP Btrieve Programmer s Reference 15 Introdction to Btrieve APIs

16 RQSHELLINIT WBRQSHELLINIT WBTRVINIT WBTRVSTOP BRQSHELLINIT While these fnctions are no obsolete, older applications that call these fnctions ill still rn ith 6.15 and later MicroKernels. (No additional fnctions have been made obsolete in Btrieve 7.0.) Btrieve Fnction Parameters Yo mst provide all parameters on every call; hoever, the MicroKernel does not se every parameter on every operation. In some cases, the MicroKernel ignores their vale. In general, different parameters can be sent and retrned for each operation. Chapter 2, Btrieve Operations provides a detailed description of the parameters that are relevant for each Btrieve operation. Note C developers: Refer to BTITYPES.H for a description of the platform-independent data types and pointers sed in the C langage interface. The parameters to the Btrieve fnctions are as follos: Operation Code Stats Code (BASIC and COBOL only) Btrieve Programmer s Reference 16 Introdction to Btrieve APIs

17 Position Block Data Bffer Data Bffer Length Key Bffer Key Nmber Client ID (BTRVID and BTRCALLID fnctions only) Key Length (BTRCALL, BTRCALLID, BTRCALL32, and BTRCALLID32 fnctions only) Operation Code The Operation Code parameter determines hat action is performed by the Btrieve fnction. For example, the operation may read, rite, delete, or pdate one or more records. Yor application mst specify a valid Operation Code on every Btrieve call. The MicroKernel never changes the Operation Code. The vale of the variable yo specify can be any one of the legal Btrieve Operation Codes described in Chapter 2, Btrieve Operations. Note C developers: The variable yo specify mst be BTI_WORD (an nsigned short integer). Stats Code Btrieve retrns stats codes as signed integers. In most programming environments, the stats code is the retrn vale of the Btrieve fnction call. Hoever, some BASIC and Btrieve Programmer s Reference 17 Introdction to Btrieve APIs

18 COBOL langage interfaces reqire a Stats Code parameter. This parameter is a 2-byte integer containing a coded vale that indicates hether any errors occrred dring the operation. After a Btrieve call, the application mst alays check the vale of the stats variable to determine if the call as sccessfl. Pervasive.SQL components retrn stats codes from calls to their APIs. When yo rite to these APIs, yo shold provide handling for three conditions: API Sccess Anticipated API failre Unanticipated API failre Folloing is a C code example that handles all three conditions. stats = BTRVID(B_VERSION, posblock1, &versionbffer, &datalen, keybf1, keynm, (BTI_BUFFER_PTR) &clientid); if (stats == B_NO_ERROR) { /* contine normal operation */ stats = BTRVID(...); } else if (stats == B_RECORD_MANAGER_INACTIVE) { /* handle knon error */ printf("btrieve Get Version() retrned B_RECORD_MANAGER_INACTIVE\n"); } else { /* nanticipated error */ printf("btrieve Get Version() retrned %d\n", stats); } /* end if-else */ Btrieve Programmer s Reference 18 Introdction to Btrieve APIs

19 By folloing this method of stats code handling, yo can help Pervasive Softare ensre yor application s ftre stability. Pervasive Softare encorages and incorporates developer feedback in order to continosly improve or prodcts. For example, in Pervasive.SQL 7, Stats Code 20 has been differentiated into several additional stats codes. Applications that handle stats information as demonstrated here can accept sch enhancements graceflly. (For more information abot the differentiation of stats codes, refer to Stats Codes and Messages.) Position Block The Position Block parameter is the address of a 128-byte array that the MicroKernel ses to store file I/O strctres and the positioning information associated ith an Open (0) operation. Each time yor application opens a file, it mst allocate a niqe Position Block. Btrieve initializes the Position Block hen yor application performs the Open operation, then references and pdates it dring file operations. Therefore, yor application mst specify the same Position Block on all sbseqent Btrieve operations for the file. Note Do not rite to the Position Block. Doing so cold reslt in a lost position error, other errors, or damage to the file. When yo open more than one file at a time, the MicroKernel ses the Position Block to determine hich file a particlar call is for. Similarly, hen yo open the same file more than once, the MicroKernel ses a different Position Block for each separate Open operation. Likeise, the MicroKernel ses a different Position Block for each separate client that opens the same file. Mltiple clients cannot share position blocks. Btrieve Programmer s Reference 19 Introdction to Btrieve APIs

20 Data Bffer Yor application transfers data to and from a file sing the Data Bffer. The information passed to or from the MicroKernel in the Data Bffer depends on hich Btrieve operation is being performed. Freqently, the Data Bffer contains one or more records that yor application is transferring to or from a file. Hoever, depending on the Btrieve operation, the Data Bffer can contain other information, sch as file or key specifications, MicroKernel version information, and so on. Be sre to allocate a large enogh Data Bffer to accommodate the longest record in yor file. If yor Data Bffer Length parameter specifies a vale smaller than the size of yor Data Bffer, Btrieve modification operations may destroy data folloing the Data Bffer. Data Bffer Length For any operation that reqires a Data Bffer, yor application mst pass a variable that indicates the size (in bytes) of the Data Bffer, hich shold be large enogh to contain data that the operation retrns. Note BASIC developers: Yor application mst pass the Data Bffer Length parameter ByRef as an integer. C, COBOL, and Pascal developers: Yor application mst pass the Data Bffer Length parameter as a pointer to a 2-byte nsigned integer. When yo are inserting records into or pdating a file ith variable-length records, the Data Bffer Length shold eqal the record length specified hen yo first created the file, pls the nmber of characters inclded beyond the fixed-length portion. When yo are retrieving variable-length records, the Data Bffer Length shold be large enogh to Btrieve Programmer s Reference 20 Introdction to Btrieve APIs

21 accommodate the longest record in the file. If a record is longer than 64 KB, yo mst se a chnk operation to operate on a portion of the record. The MicroKernel ses the Data Bffer Length parameter to determine ho mch space is available in the Data Bffer. If yo pass a Data Bffer Length that is longer than the Data Bffer yo have allocated, yo may case the MicroKernel to overrite memory. The Data Bffer Length shold alays represent the size of the allocated Data Bffer. Key Bffer Yor application mst pass the Key Bffer parameter on every Btrieve operation, even if that operation does not se a Key Bffer. Depending on the operation, yor application may set the data in the Key Bffer, or the Btrieve fnction may retrn it. Note BASIC developers: Yor application mst pass the Key Bffer as a string. If the key vale is an integer, yor application shold convert it to a string sing the MKI$ statement before calling the Btrieve fnction. If a key consists of to or more segments, yo mst concatenate them into a single string variable and pass the variable as the Key Bffer. The MicroKernel retrns an error if the string variable passed as the Key Bffer is shorter than the key s defined length. If yor application s first call does not reqire initialization of the Key Bffer, assign the string variable the vale SPACE$(x), here x represents the key s defined length. Until yor application assigns some vale in BASIC to the string variable, it has a length of 0. C developers: Yor application mst pass the Key Bffer as the address of a variable containing the key vale. The file BTITYPES.H defines the Key Bffer as a VOID pointer (BTI_VOID_PTR). Yor application can then define the Key Bffer type as needed. Btrieve Programmer s Reference 21 Introdction to Btrieve APIs

22 COBOL developers: Yor application mst pass the Key Bffer as a record variable. If the key consists of to or more segments, list them in the correct order as individal fields nder an 01 level record. Then yo can pass the entire record as the Key Bffer. Pascal developers: Yor application mst pass the Key Bffer as a variable containing a key vale. If a key consists of to or more segments, se a record strctre to define the individal fields in the key. In most environments, the MicroKernel cannot determine the Key Bffer length hen an application makes a Btrieve call. Therefore, yo mst ensre that the bffer is at least as long as the key length yo specified hen yo first created the key. Otherise, Btrieve operations may destroy data stored in memory folloing the Key Bffer. It is best to alays have a 256-byte Key Bffer. Key Nmber The information passed in the Key Nmber parameter depends on hich operation is being performed. Most often, the Key Nmber contains a vale that indicates hich of p to 119 key (access) paths to follo for a particlar operation. Hoever, other information can be sent or retrned in the Key Nmber parameter, sch as a vale indicating in hat mode a file is to be opened. For BTRV and BTRVID fnctions, the Key Nmber parameter is a 2-byte integer. For BTRCALL, BTRCALLID, BTRCALL32, and BTRCALLID32 fnctions, the Key Nmber parameter is a 1-byte signed CHARACTER (BTI_CHAR). In all fnctions, the Key Nmber parameter has a vale range of 0 throgh 118. A Btrieve fnction never alters the Key Nmber parameter. Btrieve Programmer s Reference 22 Introdction to Btrieve APIs

23 Client ID The Client ID parameter is sed only in the BTRVID and BTRCALLID fnctions. The Client ID parameter is the address of a 16-byte strctre that allos the MicroKernel to differentiate among the clients on a compter. Use the folloing strctre for the Client ID. Table 1-2 Client ID Strctre Element Length (bytes) Description Filler 12 Initialize to 0. Service Agent ID 2 Identifies each instance of yor application to the MicroKernel. This is a 2-character ASCII vale. The vale of this identifier mst be greater than or eqal to the ASCII vale AA (0x41 0x41). The MicroKernel assmes special meaning for the folloing vales: 0x4140 (@A) 0xFFFF 0x4952 (RI) 0x4553 (SE) 0x4353 (SC) 0x4544 (DC) 0x4544 (DE) 0x5544 (DU) 0x5257 (WR) Used internally. Used internally. Used internally. Used to identify clients originated by Scalable SQL. Used by Btrieve Reqesters. Btrieve Programmer s Reference 23 Introdction to Btrieve APIs

24 Table 1-2 Client ID Strctre contined Element Length (bytes) Description Client Identifier 2 Establishes a client s identity ithin the crrent instance of yor application. The MicroKernel ses this niqe identifier for concrrency and transaction-processing prposes. Key Length The Key Length parameter is sed only in the BTRCALL, BTRCALLID, BTRCALL32, and BTRCALLID32 fnctions and is specific to the OS/2 and Windos 3.x operating systems. While the Key Length parameter is crrently reserved for internal se by the MicroKernel, if yor application calls BTRCALL, BTRCALLID, BTRCALL32, or BTRCALLID32, it mst pass the Key Length parameter as an nsigned char (BTI_BYTE), ith a vale of 255 (the maximm length of any key). Btrieve Programmer s Reference 24 Introdction to Btrieve APIs

25 Smmary of Btrieve Operations Btrieve provides over 40 operations that yo can call from yor application program. The folloing tables smmarize these operations. Refer to Chapter 2, Btrieve Operations for complete descriptions of the Btrieve operations. Refer to Appendix C, Qick Reference of Btrieve Operations for a smmary of Btrieve operations ordered by operation code. Session-Specific Operations The folloing operations allo yo to set or retrieve the crrent directory, sht don a orkstation MicroKernel, retrieve the MicroKernel version nmber, terminate a client connection ith the server MicroKernel, and begin, end, or abort a transaction. In applications that handle mltiple clients, these operations are specific to the calling client. Table 1-3 Session-Specific Operations Operation Code Description Set Directory 17 Changes the crrent directory. Get Directory 18 Retrns the crrent directory. Stop 25 Terminates the orkstation MicroKernel (not available for serverbased MicroKernels). Version 26 Retrns the version nmber of the MicroKernel. Reset 28 Releases all resorces held by a client. Btrieve Programmer s Reference 25 Introdction to Btrieve APIs

26 Table 1-3 Session-Specific Operations contined Operation Code Description Begin Transaction Marks the beginning of a set of logically related operations. Operation 19 begins an exclsive transaction. Operation 1019 begins a concrrent transaction. End Transaction 20 Marks the end of a set of logically related operations. Abort Transaction 21 Removes operations performed dring an incomplete transaction. File-Specific Operations The folloing operations deal ith a specific file, and therefore se the position block parameter to identify the file on hich to operate. The file-specific operations are of three types: File access and information. These operations allo yo to create a file, open and close a file, retrieve file statistics, set and clear the file s oner name, start or stop continos operation mode on a file, nlock a file, and create and drop indexes on a file. Data retrieval. These operations allo yo to retrieve a single record or a set of records given specified criteria. Btrieve spports data retrieval either by logical location in an index path or by physical location. For more information, refer to Accessing Records in the Btrieve Programmer s Gide. In addition, yo can apply biases to the operation codes to control file and record locking in mlti-client sitations. For more information, refer to Spporting Mltiple Clients in the Btrieve Programmer s Gide. Data maniplation. These operations allo yo to insert, pdate, or delete data. Btrieve Programmer s Reference 26 Introdction to Btrieve APIs

27 Table 1-4 File Access and Information Operations Operation Code Description Open 0 Makes a file available for access. Close 1 Releases a file from availability. Create 14 Creates a file ith the specified characteristics. Stat 15 Retrns file and index characteristics, and nmber of records. Stat Extended 65 Retrns file names and paths of an extended file s components and reports hether a file is sing a system-defined log key. Set Oner 29 Assigns an oner name to a file. Clear Oner 30 Removes an oner name from a file. Continos Operation 42 Server-based MicroKernels only. Places the specified file in or removes the file from continos operation mode, for se in system backps. Unlock 27 Unlocks a record or records. Create Index 31 Creates an index. Drop Index 32 Removes an index. Btrieve Programmer s Reference 27 Introdction to Btrieve APIs

28 Table 1-5 Data Retrieval Operations Operation Code Description Index-Based (Logical) Data Retrieval Get Eqal 5 Retrns the first record in the specified index path hose key vale matches the specified key vale. Get Next 6 Retrns the record folloing the crrent record in the index path. Get Previos 7 Retrns the record preceding the crrent record in the index path. Get Greater Than 8 Retrns the first record in the specified index path hose key vale is greater than the specified key vale. Get Greater Than or Eqal 9 Retrns the first record in the specified index path hose key vale is eqal to or greater than the specified key vale. Get Less Than 10 Retrns the first record in the specified index path hose key vale is less than the specified key vale. Get Less Than or Eqal 11 Retrns the first record in the specified index path hose key vale is eqal to or less than the specified key vale. Get First 12 Retrns the first record in the specified index path. Get Last 13 Retrns the last record in the specified index path. Get Next Extended 36 Retrns one or more records that follo the crrent record in the index path. Filtering conditions can be applied. Get Previos Extended 37 Retrns one or more records that precede the crrent record in the index path. Filtering conditions can be applied. Btrieve Programmer s Reference 28 Introdction to Btrieve APIs

29 Table 1-5 Data Retrieval Operations contined Operation Code Description Get Key +50 Detects the presence of a key vale in a file, ithot retrning an actal record. Get By Percentage 44 Retrns the record located approximately at a position derived from the specified percentage vale. Find Percentage 45 Retrns a percentage figre based on the crrent record s position in the file. Non-Index-Based (Physical) Retrieval Get Position 22 Retrns the position of the crrent record. Get Direct/Chnk 23 Retrns data from the specified portions (chnks) of a record at a specified position. Get Direct/Record 23 Retrns the record at a specified position. Step Next 24 Retrns the record from the physical location folloing the crrent record. Step First 33 Retrns the record in the first physical location in the file. Step Last 34 Retrns the record in the last physical location in the file. Step Previos 35 Retrns the record in the physical location preceding the crrent record. Step Next Extended 38 Retrns one or more sccessive records from the location physically folloing the crrent record. Filtering conditions can be applied. Btrieve Programmer s Reference 29 Introdction to Btrieve APIs

30 Table 1-5 Data Retrieval Operations contined Operation Code Description Step Previos Extended 39 Retrns one or more preceding records from the location physically preceding the crrent record. Filtering conditions can be applied. Get By Percentage 44 Retrns the record located approximately at a position derived from the specified percentage vale. Find Percentage 45 Retrns a percentage figre based on the crrent record s position in the file. Concrrency Control Biases (Add to the Appropriate Operation Code) Single-record ait lock +100 Locks only one record at a time. If the record is already locked, the MicroKernel retries the operation. Single-record no-ait lock Mltiple-record ait lock Mltiple-record no-ait lock +200 Locks only one record at a time. If the record is already locked, the MicroKernel retrns an error stats code Locks several records concrrently in the same file. If the record is already locked, the MicroKernel retries the operation Locks several records concrrently in the same file. If the record is already locked, the MicroKernel retrns an error stats code. No-ait page lock +500 In a concrrent transaction, tells the MicroKernel not to ait if the page to be changed has already been changed by another active concrrent transaction. This bias can be combined ith any of the record locking biases (+100, +200, +300, or +400). Btrieve Programmer s Reference 30 Introdction to Btrieve APIs

31 Table 1-6 Data Maniplation Operations Operation Code Description Insert 2 Inserts a ne record into a file. Update 3 Updates the crrent record. Delete 4 Removes the crrent record from the file. Insert Extended 40 Inserts one or more records into a file. Update Chnk 53 Updates specified portions (chnks) of the crrent record. This operation can also append data to a record or trncate a record. Btrieve Programmer s Reference 31 Introdction to Btrieve APIs

32 Seqence of Events in Performing a Btrieve Operation To perform a Btrieve operation, yor application mst complete the folloing tasks: 1. Satisfy any prereqisites the operation reqires. For example, before yor application can perform any file I/O operations, it mst make the file available by performing an Open operation (0) on that file. 2. Initialize the parameters that the Btrieve operation reqires. The parameters are program variables or data strctres that correspond in type and size to the particlar vales that the MicroKernel expects for an operation. For ftre compatibility, initialize all parameters, hether or not they are sed. For parameters of type INTEGER, set the vale to binary 0. For character arrays, pass a pointer to a bffer. Initialize the first byte of the bffer to binary Call the appropriate Btrieve fnction. (Refer to Btrieve Fnctions.) 4. Evalate the reslts of the fnction call. Every Btrieve operation retrns a stats code. Yor application mst check the stats code and take the appropriate action. The operation also retrns data or other information to the individal parameters based on the prpose of the operation. Btrieve Programmer s Reference 32 Introdction to Btrieve APIs

33 chapter 2 Btrieve Operations This chapter describes the operations yor application can perform sing the Btrieve API. For each operation, this chapter presents the folloing information: Name, code, and description of the operation. Parameters a table indicating hich of the six parameter vales the operation expects from and retrns to yor application. A Sent parameter is sent from the application to the operation; a Retrned parameter is retrned from the operation to the application hen the operation is complete. Prereqisites the conditions yor application mst satisfy for the operation to be sccessfl. Procedre the steps for initializing the parameters that the operation reqires. Details additional information abot the operation. Reslt the reslts of both a sccessfl and an nsccessfl operation. Each operation retrns a stats code, informing yor application of the otcome of the operation. Stats Code 0 indicates the operation as sccessfl. A nonzero stats code sally indicates a failre. Hoever, some nonzero stats codes are informative and appear even hen the associated operation is sccessfl for example, Stats Code 60 means the specified reject cont has been reached. Positioning the effect the operation has on the logical and/or physical crrency of the records in a file. Btrieve Programmer s Reference 33 Btrieve Operations

34 This chapter incldes the folloing Btrieve operations, organized alphabetically: Abort Transaction (21) Begin Transaction (19 or 1019) Clear Oner (30) Close (1) Continos Operation (42) Create (14) Create Index (31) Delete (4) Drop Index (32) End Transaction (20) Find Percentage (45) Get By Percentage (44) Get Direct/Chnk (23) Get Direct/Record (23) Get Directory (18) Get Eqal (5) Get First (12) Get Greater (8) Get Key (+50) Get Last (13) Get Less Than (10) Get Next (6) Get Next Extended (36) Btrieve Programmer s Reference 34 Btrieve Operations

35 Get Position (22) Get Previos (7) Get Previos Extended (37) Insert (2) Insert Extended (40) Open (0) Reset (28) Set Directory (17) Set Oner (29) Stat (15) Stat Extended (65) Step First (33) Step Last (34) Step Next (24) Step Next Extended (38) Step Previos (35) Step Previos Extended (39) Stop (25) Unlock (27) Update (3) Update Chnk (53) Version (26) Btrieve Programmer s Reference 35 Btrieve Operations

36 Abort Transaction (21) The Abort Transaction operation terminates the crrent transaction and removes the reslts of all operations performed since the beginning of the transaction. It also nlocks all files and records locked by the transaction. Parameters Operation Code Position Block Data Bffer Data Bffer Length Key Bffer Key Nmber Sent X Retrned Prereqisites Yo mst isse a sccessfl Begin Transaction operation (19 or 1019) before yo isse an Abort Transaction operation. Procedre Set the Operation Code to 21. The MicroKernel ignores all other parameters on an Abort Transaction call. Reslt If the Abort Transaction operation is sccessfl, the MicroKernel retrns Stats Code 0. The reslts of all Insert, Update, and Delete operations issed since the beginning of the transaction are removed from the files. Btrieve Programmer s Reference 36 Btrieve Operations

37 If the Abort Transaction operation is nsccessfl, the MicroKernel retrns one of the folloing stats codes: 36 The application encontered a transaction error. 39 A Begin Transaction operation mst precede an End/Abort Transaction operation. Positioning The Abort Transaction operation has no effect on any file crrency information. Btrieve Programmer s Reference 37 Btrieve Operations

38 Begin Transaction (19 or 1019) The Begin Transaction operation defines the start of a transaction. Transactions are sefl hen yo need to perform mltiple Btrieve operations as a single event. For example, se a transaction if yor database old become logically inconsistent if some operations ere sccessfl, bt at least one operation failed to complete sccessflly. By enclosing a set of operations beteen Begin and End Transaction operations, yo can ensre that the MicroKernel does not permanently complete any operations in the set nless yo reqest the completion ith an explicit End Transaction operation (20). The MicroKernel prohibits certain operations dring transactions becase they have too great an effect on the file or on performance. These operations inclde Set Oner, Clear Oner, Create Index, Drop Index, and Close (for files pdated dring the transaction). Parameters Operation Code X Position Block Data Bffer Data Bffer Length Key Bffer Key Nmber Sent Retrned Prereqisites Yor application mst end or abort any previos transaction before issing a Begin Transaction operation. Btrieve Programmer s Reference 38 Btrieve Operations

39 Procedre Set the Operation Code to 19 to begin an exclsive transaction, or 1019 to begin a concrrent transaction. The MicroKernel ignores all parameters except the Operation Code on any Begin Transaction call. On any Begin Transaction operation, yo can specify defalt lock biases: +100 Single ait record lock Single no-ait record lock Mltiple ait record lock Mltiple no-ait record lock. On a Begin Concrrent Transaction operation, yo can add +500 to the Operation Code (1519), hich forces the MicroKernel not to retry the Insert, Update, and Delete operations ithin a transaction. In addition, yo can combine the +500 bias ith a defalt lock bias (+100, +200, +300, or +400). For example, sing (1719) begins a concrrent transaction, sppresses retries for Insert, Update, and Delete operations, and specifies single no-ait read locks at the same time. For more information abot transactions and locking, refer to the Btrieve Programmer s Gide. Reslt If the Begin Transaction operation is sccessfl, the MicroKernel retrns Stats Code 0. Btrieve Programmer s Reference 39 Btrieve Operations

40 If the Begin Transaction operation is nsccessfl, the MicroKernel retrns one of the folloing stats codes: 36 The application encontered a transaction error. 37 Another transaction is active. Positioning The Begin Transaction operation has no effect on any file crrency information. Btrieve Programmer s Reference 40 Btrieve Operations

41 Clear Oner (30) The Clear Oner operation removes an oner name that yo have previosly assigned to a file ith the Set Oner operation. If the file as previosly encrypted, the MicroKernel decrypts the file dring a Clear Oner operation. Parameters Operation Code Position Block Data Bffer Data Bffer Length Key Bffer Key Nmber Sent X X Retrned X Prereqisites The file mst be open. No transactions can be active. Procedre 1. Set the Operation Code to Pass the Position Block that identifies the file to clear. Reslt After a Clear Oner operation, the MicroKernel no longer reqires the oner name to open or modify a file. If yo encrypted the data in the file hen yo assigned the oner, the MicroKernel decrypts the data dring a Clear Oner operation. The more data that as encrypted, the longer the Clear Oner operation takes. Btrieve Programmer s Reference 41 Btrieve Operations

42 If the Clear Oner operation is nsccessfl, the MicroKernel retrns one of the folloing stats codes: 3 The file is not open. 41 The MicroKernel does not allo the attempted operation. Positioning The Clear Oner operation has no effect on any file crrency information. Btrieve Programmer s Reference 42 Btrieve Operations

43 Close (1) The Close operation closes the file associated ith a specified Position Block and releases any locks yor application has exected for the file. Yor application shold alays perform a Close operation hen it has finished accessing a file. After a Close operation, yor application cannot access the file again ntil it isses another Open operation (0) for that file. Yo can close a file even hile inside a transaction. Hoever, the Close operation does not end the transaction; yo mst explicitly end or abort the transaction. If yo abort the transaction, changes made inside the transaction are aborted; if yo end the transaction, changes are committed. Parameters Operation Code Position Block Data Bffer Data Bffer Length Key Bffer Key Nmber Sent X X Retrned Prereqisites The file mst be open. Procedre 1. Set the Operation Code to Pass a valid Position Block for the file to close. Btrieve Programmer s Reference 43 Btrieve Operations

44 Reslt If the Close operation is sccessfl, the Position Block for the closed file is no longer valid. Yor application can se it for another file or se the data area for other prposes. If the Close operation fails, the file remains open and the MicroKernel retrns the folloing stats code: 3 The file is not open. Positioning The Close operation destroys both the physical and the logical crrency information of the file. Btrieve Programmer s Reference 44 Btrieve Operations

45 Continos Operation (42) The Continos Operation operation allos yo to perform system backps ithot closing active Btrieve files. Any changes yo make hile a file is being backed p are stored in a temporary file called a delta file. Except for changes ritten to the delta file, the system backp incldes the contents of all files placed in continos operation mode. The MicroKernel atomatically rolls the delta file changes into the backed p files hen those files are taken ot of continos operation mode. This operation also allos yo to copy a file hile that file is still active. Note This operation is available only to applications rnning local on a server machine. Parameters Operation Code Position Block Data Bffer Data Bffer Length Key Bffer Note Vales for the Data Bffer parameter and the Data Bffer Length parameter are reqired only if the vale of the Key Nmber parameter is 0 (hich starts continos operation mode) or 2 (hich ends continos operation mode). The folloing sections discss these Key Nmber vales. A Data Bffer Length of zero is reqired for a Key Nmber parameter of 1. Key Nmber Sent X X X X Retrned X X Btrieve Programmer s Reference 45 Btrieve Operations

46 Procedre To start continos operation mode, perform the folloing steps: 1. Define a file or a set of files for backp, or add a file to the set of files crrently defined for backp. a. Set the Operation Code to 42. b. Place the names of the files yo ant to place in continos operation mode into the Data Bffer parameter. Inclde the fll pathname, exclding only the server name. Separate the names ith commas and terminate the list of names ith a binary 0. The folloing example is for Windos NT servers: f:\acct\march.mkd,f:\acct\april.mkd The folloing example is for NetWare servers: sys:\acct\march.mkd,sys:\acct\april.mkd c. Place the length of the name (or names) in the Data Bffer Length parameter. This vale mst be eqal to or greater than the actal length of the names (inclding binary zeros) in the Data Bffer itself. For example, the preceding names reqire a Data Bffer Length of 40 or greater. d. Set the Key Nmber parameter to Perform the backp. 3. End continos operation mode. a. Set the Operation Code to 42. b. Set the Key Nmber parameter to 1. To end continos operation on one or more specific files, set the Key Nmber parameter to 2, and then place the filenames in the Data Bffer parameter as described in step 1b. Also, place the length of the name (or names) in the Data Bffer Length parameter as described in step 1c. Btrieve Programmer s Reference 46 Btrieve Operations

47 Details When defining the set of files to be backed p, keep in mind the folloing information: The MicroKernel does not consider the absence of filenames in the Data Bffer to be an error. If it finds no filenames, the MicroKernel takes no action on the Continos Operation operation. The presence of dplicate filenames in the Data Bffer does not affect ho the Continos Operation operation orks. The MKDE places the specified file in continos operation mode only once. No to files are alloed to share the same filename and differ only in their extension. This is becase the name of the delta file ses the corresponding file s name ith.^^^ for the extension. An application can iteratively call the Continos Operation operation to add more names to the list of files to be placed in continos operation mode. Hoever, this action can corrpt a backp hen referential integrity (RI) constraints are placed on any of the files by Scalable SQL. The MicroKernel retrns Stats Code 88 if a file is specified that is already in continos operation mode. When riting a server-based application that calls the Continos Operation operation, make sre yo call btrvid, and se a valid client ID so yo can begin and end continos operation nder the same client. Btrieve allos yo to define mltiple backp sets by specifying a different client ID for each backp set throgh the btrvid fnction. Hoever, to sets cannot contain the same files. While the MicroKernel rolls changes from the delta file into the data file, sers can contine to pdate, insert, and read the Btrieve file jst as they normally old. The Btrieve Programmer s Reference 47 Btrieve Operations

High Availability for Microsoft SQL Server Using Double-Take 4.x

High Availability for Microsoft SQL Server Using Double-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network

More information

High Availability for Internet Information Server Using Double-Take 4.x

High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks

More information

Deploying Network Load Balancing

Deploying Network Load Balancing C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft

More information

Planning a Managed Environment

Planning a Managed Environment C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the

More information

Designing and Deploying File Servers

Designing and Deploying File Servers C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.

More information

Pgrading To Windows XP 4.0 Domain Controllers and Services

Pgrading To Windows XP 4.0 Domain Controllers and Services C H A P T E R 8 Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory Upgrading yor domains from Microsoft Windows NT 4.0 to Windows Server 2003 Active Directory directory service enables

More information

Enabling Advanced Windows Server 2003 Active Directory Features

Enabling Advanced Windows Server 2003 Active Directory Features C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment

More information

Introduction to HBase Schema Design

Introduction to HBase Schema Design Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior

More information

EMC PowerPath Virtual Appliance

EMC PowerPath Virtual Appliance EMC PowerPath Virtal Appliance Version 1.2 Administration Gide P/N 302-000-475 REV 01 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished October, 2013 EMC believes the information

More information

aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë

aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë C H A P T E R 7 aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë Deploying Microsoft Windows Server 2003 s involves creating new geographically based child domains nder the forest root domain. Deploying

More information

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements...

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements... PostgreSQL backps with NetWorker Release nmber 1.0 302-001-174 REV 01 Jne 30, 2014 Adience... 2 Reqirements... 2 Terminology... 2 PostgreSQL backp methodologies...2 PostgreSQL dmp backp... 3 Configring

More information

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03 EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information

More information

Planning an Active Directory Deployment Project

Planning an Active Directory Deployment Project C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,

More information

Designing an Authentication Strategy

Designing an Authentication Strategy C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,

More information

Isilon OneFS. Version 7.1. Backup and recovery guide

Isilon OneFS. Version 7.1. Backup and recovery guide Isilon OneFS Version 7.1 Backp and recovery gide Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished March, 2014 EMC believes the information in this pblication is accrate

More information

EMC VNX Series Setting Up a Unisphere Management Station

EMC VNX Series Setting Up a Unisphere Management Station EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre

More information

EMC ViPR Analytics Pack for VMware vcenter Operations Management Suite

EMC ViPR Analytics Pack for VMware vcenter Operations Management Suite EMC ViPR Analytics Pack for VMware vcenter Operations Management Site Version 1.1.0 Installation and Configration Gide 302-000-487 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished

More information

EMC Data Domain Operating System

EMC Data Domain Operating System EMC Data Domain Operating System Version 5.4 Administration Gide 302-000-072 REV. 06 Copyright 2009-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished September, 2014 EMC believes the

More information

Planning a Smart Card Deployment

Planning a Smart Card Deployment C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive

More information

Designing a TCP/IP Network

Designing a TCP/IP Network C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation

More information

GUIDELINE. Guideline for the Selection of Engineering Services

GUIDELINE. Guideline for the Selection of Engineering Services GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by

More information

5 Using Your Verbatim Autodialer

5 Using Your Verbatim Autodialer 5 Using Yor Verbatim Atodialer 5.1 Placing Inqiry Calls to the Verbatim Atodialer ( Yo may call the Verbatim atodialer at any time from any phone. The nit will wait the programmed nmber of rings before

More information

HSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement

HSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement HSBC Internet Banking Combined Prodct Disclosre Statement and Spplementary Prodct Disclosre Statement AN IMPORTANT MESSAGE FOR HSBC CUSTOMERS NOTICE OF CHANGE For HSBC Internet Banking Combined Prodct

More information

Planning and Implementing An Optimized Private Cloud

Planning and Implementing An Optimized Private Cloud W H I T E PA P E R Intelligent HPC Management Planning and Implementing An Optimized Private Clod Creating a Clod Environment That Maximizes Yor ROI Planning and Implementing An Optimized Private Clod

More information

Upgrading Windows 2000 Domains to Windows Server 2003 Domains

Upgrading Windows 2000 Domains to Windows Server 2003 Domains C H A P T E R 9 Upgrading Windows 2000 Domains to Windows Server 2003 Domains Upgrading yor network operating system from Microsoft Windows 2000 to Windows Server 2003 reqires minimal network configration

More information

Closer Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations

Closer Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012

More information

Preparing your heavy vehicle for brake test

Preparing your heavy vehicle for brake test GUIDE Preparing yor heavy vehicle for brake test A best practice gide Saving lives, safer roads, ctting crime, protecting the environment Breaking the braking myth Some people believe that a locked wheel

More information

EMC NetWorker. Performance Optimization Planning Guide. Version 8.2 302-000-697 REV 01

EMC NetWorker. Performance Optimization Planning Guide. Version 8.2 302-000-697 REV 01 EMC NetWorker Version 8.2 Performance Optimization Planning Gide 302-000-697 REV 01 Copyright 2000-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Janary, 2015 EMC believes the information

More information

Purposefully Engineered High-Performing Income Protection

Purposefully Engineered High-Performing Income Protection The Intelligent Choice for Disability Income Insrance Prposeflly Engineered High-Performing Income Protection Keeping Income strong We engineer or disability income prodcts with featres that deliver benefits

More information

The Intelligent Choice for Disability Income Protection

The Intelligent Choice for Disability Income Protection The Intelligent Choice for Disability Income Protection provider Pls Keeping Income strong We prposeflly engineer or disability income prodct with featres that deliver benefits sooner and contine paying

More information

What's New in Btrieve 12

What's New in Btrieve 12 Btrieve 12 What's New in Btrieve 12 An Overview of New Features and Changed Behavior disclaimer trademarks ACTIAN CORPORATION LICENSES THE SOFTWARE AND DOCUMENTATION PRODUCT TO YOU OR YOUR COMPANY SOLELY

More information

EMC PowerPath/VE Installation and Administration Guide

EMC PowerPath/VE Installation and Administration Guide EMC PowerPath/VE Installation and Administration Gide Version 5.9 and Minor Releases for VMware vsphere P/N 302-000-236 REV 03 Copyright 2009-2014. All rights reserved. Pblished in USA. EMC believes the

More information

A guide to safety recalls in the used vehicle industry GUIDE

A guide to safety recalls in the used vehicle industry GUIDE A gide to safety recalls in the sed vehicle indstry GUIDE Definitions Aftermarket parts means any prodct manfactred to be fitted to a vehicle after it has left the vehicle manfactrer s prodction line.

More information

Using GPU to Compute Options and Derivatives

Using GPU to Compute Options and Derivatives Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation

More information

Phone Banking Terms Corporate Accounts

Phone Banking Terms Corporate Accounts Phone Banking Terms Corporate Acconts If there is any inconsistency between the terms and conditions applying to an Accont and these Phone Banking Terms, these Phone Banking Terms prevail in respect of

More information

Direct Loan Basics & Entrance Counseling Guide. For Graduate and Professional Student Direct PLUS Loan Borrowers

Direct Loan Basics & Entrance Counseling Guide. For Graduate and Professional Student Direct PLUS Loan Borrowers Direct Loan Basics & Entrance Conseling Gide For Gradate and Professional Stdent Direct PLUS Loan Borrowers DIRECT LOAN BASICS & ENTRANCE COUNSELING GUIDE For Gradate and Professional Stdent Direct PLUS

More information

EMC Storage Analytics

EMC Storage Analytics EMC Storage Analytics Version 2.1 Installation and User Gide 300-014-858 09 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes the information in

More information

Contents Welcome to FOXTEL iq2...5 For your safety...6 Getting Started...7 Playlist... 51 Active...53 Setup...54 FOXTEL Guide...18 ON DEMAND...

Contents Welcome to FOXTEL iq2...5 For your safety...6 Getting Started...7 Playlist... 51 Active...53 Setup...54 FOXTEL Guide...18 ON DEMAND... Contents Welcome to FOXTEL iq2...5 The FOXTEL iq2...5 Updates to FOXTEL iq2...5 Getting in toch with FOXTEL...5 For yor safety...6 Getting Started...7 Switching the FOXTEL iq2 on and off...7 Changing channel...7

More information

The Intelligent Choice for Basic Disability Income Protection

The Intelligent Choice for Basic Disability Income Protection The Intelligent Choice for Basic Disability Income Protection provider Pls Limited Keeping Income strong We prposeflly engineer or basic disability income prodct to provide benefit-rich featres delivering

More information

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7 Introdcing Revene Cycle Optimization! STI Provides More Options Than Any Other Software Vendor ChartMaker Clinical 3.7 2011 Amblatory EHR + Cardiovasclar Medicine + Child Health STI Provides More Choices

More information

Candidate: Suzanne Maxwell. Date: 09/19/2012

Candidate: Suzanne Maxwell. Date: 09/19/2012 Medical Coder / Billing Clerk Assessment Report Szanne Maxwell 09/19/2012 www.resorceassociates.com Szanne Maxwell 09/19/2012 Prepared For: NAME Prepared by: John Lonsbry, Ph.D. & Lcy Gibson, Ph.D., Licensed

More information

Kentucky Deferred Compensation (KDC) Program Summary

Kentucky Deferred Compensation (KDC) Program Summary Kentcky Deferred Compensation (KDC) Program Smmary Smmary and Highlights of the Kentcky Deferred Compensation (KDC) Program Simple. Smart. For yo. For life. 457 Plan 401(k) Plan Roth 401(k) Deemed Roth

More information

EMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02

EMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02 EMC ViPR Version 1.1.0 Concepts Gide 302-000-482 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is

More information

Candidate: Kyle Jarnigan. Date: 04/02/2012

Candidate: Kyle Jarnigan. Date: 04/02/2012 Cstomer Service Manager Assessment Report 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. Cstomer Service Manager Assessment Report 04/02/2012 Prepared For: NAME Prepared by:

More information

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting www.pwc.com Corporate performance: What do investors want to know? Innovate yor way to clearer financial reporting October 2014 PwC I Innovate yor way to clearer financial reporting t 1 Contents Introdction

More information

MicroKernel Database Engine Status Codes This section describes status codes that the MicroKernel returns.

MicroKernel Database Engine Status Codes This section describes status codes that the MicroKernel returns. MicroKernel Database Engine Status Codes This section describes status codes that the MicroKernel returns. 1: The operation parameter is invalid The specified operation does not exist or is not valid.

More information

10 Evaluating the Help Desk

10 Evaluating the Help Desk 10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem

More information

The Role of the Community Occupational Therapist

The Role of the Community Occupational Therapist Ceredigion Conty Concil Social Services Department The Role of the Commnity Occpational Therapist...taking care to make a difference Large Print or other format/medim are available on reqest please telephone

More information

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t Exective Coaching to Activate the Renegade Leader Within Renegades Do What Others Won t To Get the Reslts that Others Don t Introdction Renegade Leaders are a niqe breed of leaders. The Renegade Leader

More information

Regular Specifications of Resource Requirements for Embedded Control Software

Regular Specifications of Resource Requirements for Embedded Control Software Reglar Specifications of Resorce Reqirements for Embedded Control Software Rajeev Alr and Gera Weiss University of Pennsylvania Abstract For embedded control systems a schedle for the allocation of resorces

More information

NAPA TRAINING PROGRAMS FOR:

NAPA TRAINING PROGRAMS FOR: NAPA TRAINING PROGRAMS FOR: Employees Otside Sales Store Managers Store Owners See NEW ecatalog Inside O V E R V I E W 2010_StoreTrainingBrochre_SinglePg.indd 1 5/25/10 12:39:32 PM Welcome 2010 Store Training

More information

Borrowing for College. Table of contents. A guide to federal loans for higher education

Borrowing for College. Table of contents. A guide to federal loans for higher education Borrowing for College A gide to federal loans for higher edcation Table of contents Edcation loan basics 2 Applying for edcation loans 3 Repaying edcation loans 3 Controlling edcation loan debt 5 Glossary

More information

STI Has All The Pieces Hardware Software Support

STI Has All The Pieces Hardware Software Support STI Has All The Pieces Hardware Software Spport STI has everything yo need for sccessfl practice management, now and in the ftre. The ChartMaker Medical Site Incldes: Practice Management/Electronic Billing,

More information

The Time is Now for Stronger EHR Interoperability and Usage in Healthcare

The Time is Now for Stronger EHR Interoperability and Usage in Healthcare The Time is Now for Stronger EHR Interoperability and Usage in Healthcare Sponsored by Table of Contents 03 Stdy: Large Nmber of EHRs Do Not Meet Usability Standards 05 Black Book: EHR Satisfaction Growing

More information

8 Service Level Agreements

8 Service Level Agreements 8 Service Level Agreements Every organization of men, be it social or political, ltimately relies on man s capacity for making promises and keeping them. Hannah Arendt Key Findings Only abot 20 percent

More information

7 Help Desk Tools. Key Findings. The Automated Help Desk

7 Help Desk Tools. Key Findings. The Automated Help Desk 7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part

More information

KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT

KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT 5 KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT by: John Barrett Personal assistants (PAs) and their ability to effectively provide essential spports at the workplace are extremely important

More information

Make the College Connection

Make the College Connection Make the College Connection A college planning gide for stdents and their parents Table of contents The compelling case for college 2 Selecting a college 3 Paying for college 5 Tips for meeting college

More information

FINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet

FINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet FINANCIAL FITNESS Fact Sheet Janary 1998 FL/FF-02 SELECTING A CREDIT CARD Liz Gorham, Ph.D., AFC Assistant Professor and Family Resorce Management Specialist, Utah State University Marsha A. Goetting,

More information

Effective governance to support medical revalidation

Effective governance to support medical revalidation Effective governance to spport medical revalidation A handbook for boards and governing bodies This docment sets ot a view of the core elements of effective local governance of the systems that spport

More information

Galvin s All Things Enterprise

Galvin s All Things Enterprise Galvin s All Things Enterprise The State of the Clod, Part 2 PETER BAER GALVIN Peter Baer Galvin is the CTO for Corporate Technologies, a premier systems integrator and VAR (www.cptech. com). Before that,

More information

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated

More information

Herzfeld s Outlook: Seasonal Factors Provide Opportunities in Closed-End Funds

Herzfeld s Outlook: Seasonal Factors Provide Opportunities in Closed-End Funds VIRTUS HERZFELD FUND Herzfeld s Otlook: Seasonal Factors Provide Opportnities in Closed-End Fnds When it comes to investing in closed-end fnds, a comprehensive nderstanding of the inefficiencies of the

More information

Candidate: Shawn Mullane. Date: 04/02/2012

Candidate: Shawn Mullane. Date: 04/02/2012 Shipping and Receiving Specialist / Inventory Control Assessment Report Shawn Mllane 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. Shawn Mllane 04/02/2012 Prepared For: NAME

More information

Anatomy of SIP Attacks

Anatomy of SIP Attacks Anatomy of SIP Attacks João M. Ceron, Klas Steding-Jessen, and Cristine Hoepers João Marcelo Ceron is a Secrity Analyst at CERT.br/NIC.br. He holds a master s degree from Federal University of Rio Grande

More information

EMC Storage Resource Management Suite

EMC Storage Resource Management Suite EMC Storage Resorce Management Site Version 3.0.2.0 Installation and Configration Gide PN 302-000-859 REV 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished April, 2014

More information

Backup Agent. Backup Agent Guide

Backup Agent. Backup Agent Guide Backup Agent Backup Agent Guide disclaimer trademarks ACTIAN CORPORATION LICENSES THE SOFTWARE AND DOCUMENTATION PRODUCT TO YOU OR YOUR COMPANY SOLELY ON AN AS IS BASIS AND SOLELY IN ACCORDANCE WITH THE

More information

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH 8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351

More information

Form M-1 Report for Multiple Employer Welfare Arrangements (MEWAs) and Certain Entities Claiming Exception (ECEs)

Form M-1 Report for Multiple Employer Welfare Arrangements (MEWAs) and Certain Entities Claiming Exception (ECEs) U.S. Department of Labor Employee Benefits Secrity Administration Room N5511 200 Constittion Avene, NW Washington, DC 20210 P-450 Form M-1 Report for Mltiple Employer Welfare Arrangements (MEWAs) and Certain

More information

Health Care ID Card Enhancements

Health Care ID Card Enhancements State of California Health Care Enhancements Incorporating National WEDI Indstry Card Standards and the UnitedHealthcare Branding Transition UnitedHealthcare is the first health company to se the national

More information

MVM-BVRM Video Recording Manager v2.22

MVM-BVRM Video Recording Manager v2.22 Video MVM-BVRM Video Recording Manager v2.22 MVM-BVRM Video Recording Manager v2.22 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability

More information

Welcome to UnitedHealthcare. Ideally, better health coverage should cost less. In reality, now it can.

Welcome to UnitedHealthcare. Ideally, better health coverage should cost less. In reality, now it can. Welcome to UnitedHealthcare Ideally, better health coverage shold cost less. In reality, now it can. The plan designed with both qality and affordability in mind. Consistent, qality care is vitally important.

More information

Opening the Door to Your New Home

Opening the Door to Your New Home Opening the Door to Yor New Home A Gide to Bying and Financing. Contents Navigating Yor Way to Home Ownership...1 Getting Started...3 Finding Yor Home...9 Finalizing Yor Financing...12 Final Closing...13

More information

Candidate: Cassandra Emery. Date: 04/02/2012

Candidate: Cassandra Emery. Date: 04/02/2012 Market Analyst Assessment Report 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. 04/02/2012 Prepared For: Resorce Associates Prepared by: John Lonsbry, Ph.D. & Lcy Gibson, Ph.D.,

More information

Facilities. Car Parking and Permit Allocation Policy

Facilities. Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Contents Page 1 Introdction....................................................2 2.0 Application

More information

Closer Look at ACOs. Putting the Accountability in Accountable Care Organizations: Payment and Quality Measurements. Introduction

Closer Look at ACOs. Putting the Accountability in Accountable Care Organizations: Payment and Quality Measurements. Introduction Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012

More information

Health Benefits Coverage Under Federal Law...

Health Benefits Coverage Under Federal Law... covers Labor Compliance 2014mx.pdf 1 11/19/2014 2:05:01 PM Compliance Assistance Gide Health Benefits Coverage Under Federal Law... The Affordable Care Act Health Insrance Portability and Accontability

More information

Social Work Bursary: Academic year 2015/16 Application notes for students on undergraduate courses

Social Work Bursary: Academic year 2015/16 Application notes for students on undergraduate courses Social Work Brsary: Academic year 2015/16 Application notes for stdents on ndergradate corses These notes are for ndergradate stdents who have previosly received a brsary. Please make sre yo complete the

More information

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic

More information

EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers

EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers EMC Smarts SAM, IP, ESM, MPLS, VoIP, and NPM Managers Version 9.2.2 Spport Matrix 302-000-357 REV 02 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes

More information

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists. Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so

More information

Chapter 1. LAN Design

Chapter 1. LAN Design Chapter 1 LAN Design CCNA3-1 Chapter 1 Note for Instrctors These presentations are the reslt of a collaboration among the instrctors at St. Clair College in Windsor, Ontario. Thanks mst go ot to Rick Graziani

More information

CRM Customer Relationship Management. Customer Relationship Management

CRM Customer Relationship Management. Customer Relationship Management CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2

More information

The bintec HotSpot Solution. Convenient internet access anywhere

The bintec HotSpot Solution. Convenient internet access anywhere The bintec HotSpot Soltion Convenient internet access anywhere Convenient internet access for all kinds of spaces Today s internet sers are freqently on the go. They expect to have internet access on their

More information

3 Building Blocks Of Optimized Price & Promotion Strategies

3 Building Blocks Of Optimized Price & Promotion Strategies 3 Bilding Blocks Of Optimized Price & Promotion Strategies Boosting Brand Loyalty And Profits With Visal Analytics Sponsored by E-book Table of contents Introdction... 3 Consolidate And Analyze Data From

More information

ICT Usage by Households: 2014

ICT Usage by Households: 2014 3 March 2015 1100 hrs 042/2015 In 2014, 80.7 per cent of hoseholds in Malta and Gozo had access to the internet, while reglar internet sers reached 239,225 or 73.2 per cent of the poplation aged 16 to

More information

Dialog 4106 Basic/Dialog 4147 Medium

Dialog 4106 Basic/Dialog 4147 Medium Dialog 4106 Basic/Dialog 4147 Medim Analog Telephones for MD110 Commnication System User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select

More information

9 Setting a Course: Goals for the Help Desk

9 Setting a Course: Goals for the Help Desk IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities

More information

Getting Started with Pervasive DataExchange

Getting Started with Pervasive DataExchange Pervasive DataExchange Getting Started with Pervasive DataExchange Data Synchronization Edition Pervasive Software Inc. 12365 Riata Trace Parkway Building B Austin, TX 78727 USA Telephone: 512 231 6000

More information

The Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1

The Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1 The Botiqe Premim Do Botiqe Investment Managers Create Vale? AMG White Paper Jne 2015 1 Exective Smmary Botiqe active investment managers have otperformed both non-botiqe peers and indices over the last

More information

5 High-Impact Use Cases of Big Data Analytics for Optimizing Field Service Processes

5 High-Impact Use Cases of Big Data Analytics for Optimizing Field Service Processes 5 High-Impact Use Cases of Big Analytics for Optimizing Field Service Processes Improving Field Service Efficiency and Maximizing Eqipment Uptime with Big Analytics and Machine Learning Field Service Profitability

More information

The Good Governance Standard for Public Services

The Good Governance Standard for Public Services The Good Governance Standard for Pblic Services The Independent Commission for Good Governance in Pblic Services The Independent Commission for Good Governance in Pblic Services, chaired by Sir Alan Langlands,

More information

Firewall Feature Overview

Firewall Feature Overview PALO ALTO NETWORKS: Firewall Featre Overview Firewall Featre Overview Palo Alto Networks family of next generation firewalls delivers nprecedented visibility and control of applications, sers and content

More information

Dual degree in Strategic Marketing online. Study an online MSc and MA in Strategic Marketing awarded by UNINETTUNO and Geneva Business School

Dual degree in Strategic Marketing online. Study an online MSc and MA in Strategic Marketing awarded by UNINETTUNO and Geneva Business School Dal degree in Strategic Marketing online Stdy an online MSc and MA in Strategic Marketing awarded by UNINETTUNO and Geneva Bsiness School Awarded by Geneva Bsiness School Geneva Barcelona Moscow Class

More information

CONDON-MEEK, INC. 1211 Court Street Clearwater, FL 33756 missyb@condonmeek.com Phone: (727) 446-5051 Fax: (727) 449-1964

CONDON-MEEK, INC. 1211 Court Street Clearwater, FL 33756 missyb@condonmeek.com Phone: (727) 446-5051 Fax: (727) 449-1964 CONDON-MEEK, INC. 1211 Cort Street Clearwater, FL 33756 missyb@condonmeek.com Phone: (727) 446-5051 Fax: (727) 449-1964 Enclosed yo will find a non-admitted n Profit Package qote for Clearwater Neighborhood

More information

Analog Telephones. User Guide. BusinessPhone Communication Platform

Analog Telephones. User Guide. BusinessPhone Communication Platform Analog Telephones BsinessPhone Commnication Platform User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and make

More information

Pervasive Backup Agent Guide

Pervasive Backup Agent Guide Pervasive Backup Agent Pervasive Backup Agent Guide Pervasive Software Inc. 12365 Riata Trace Parkway Building B Austin, TX 78727 USA Telephone: 512 231 6000 or 800 287 4383 Fax: 512 231 6010 Email: info@pervasive.com

More information

The Good Governance Standard for Public Services

The Good Governance Standard for Public Services The Good Governance Standard for Pblic Services The Independent Commission on Good Governance in Pblic Services Good Governance Standard for Pblic Services OPM and CIPFA, 2004 OPM (Office for Pblic Management

More information

BIS - Overview and basic package V2.5

BIS - Overview and basic package V2.5 Engineered Soltions BIS - Overview and basic package V2.5 BIS - Overview and basic package V2.5 www.boschsecrity.com Complete enterprise management for efficient, integrated bilding and secrity management

More information